IT認証試験問題集
毎月、ITshikenは1500人以上の受験者が試験準備を助けて、試験に合格するために受験者にご協力します
 ホームページ / 2V0-642 問題集  / 2V0-642 問題練習

VMware 2V0-642 問題練習

VMware Certified Professional 6 - Network Virtualization 6.2 Exam 試験

最新更新時間: 2019/07/10,合計90問。

平成から令和へ:2V0-642 最新真題を買う時、日本語版と英語版両方を同時に獲得できます。

実際の問題集を練習し、試験のポイントを了解し、テストに申し込むするかどうかを決めることができます。

さらに試験準備時間の35%を節約するには、2V0-642 問題集を使用してください。

 / 6

Question No : 1
Which three objects are supported for universal synchronization in a Cross-vCenter NSX deployment? (Choose three)

正解:
Explanation:
https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.3/com.vmware.nsx.cross-vcenter-install.doc/GUID-35831055-57D8-4F2F-95BA-8EFE5362746C.html

Question No : 2
An NSX Administrator is examining traffic on the network shown below:



What is the packet flow when VM1 communicates to VMS?

正解:
Explanation:
B is not correct ― “send it to the DLR control VM.” packet not going to DLR VM
D is not correct ― “route the packet to the DLR control VM” ― nothing goes to DLR VM
A is not correct ― “Host C will perform a destination lookup” ― as source is doing the destination lookup

Question No : 3
Which three ways can membership be defined in a dynamic security group? (Choose three)

正解:
Explanation:
Security Group
You begin by creating a security group to define assets that you want to protect. Security groups may be static (including specific virtual machines) or dynamic where membership may be defined in one or more of the following ways:
■ vCenter containers (clusters, port groups, or datacenters)
■ Security tags, IPset, MACset, or even other security groups. For example, you may include a criteria to add all members tagged with the specified security tag (such as AntiVirus.virusFound) to the security group.
■ Directory Groups (if NSX Manager is registered with Active Directory)
■ Regular expressions such as virtual machines with name VM1
https://blogs.vmware.com/consulting/2015/01/automating-security-policy-enforcement-nsx-service-composer.html
Ynamic membership of a security group can be defined by one or multiple criteria, like vCenter containers (data centers, port groups and clusters), security tags, Active Directory groups, regular expressions on virtual machine names, and so on.
https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-DBA0522E-92DC-48F4-8801-49C92E001AA1.html

Question No : 4
A group of users' needs secured access to a set of web-based applications in a SDDC.
Which VPN option is best suited for this?

正解:

Question No : 5
Which tool is used to display VXLAN connection information?

正解:

Question No : 6
An administrator needs to verify which port the switch manager is using. Which command should be used?

正解:
Explanation:
C. show controller-cluster connections
nsx-controller # show control-cluster connections
role port listening open conns
――――――――――――――――――C
api_provider api/443 Y 2
――――――――――――――――――C
persistence_server server/2878 C 0
client/2888 Y 1
election/3888 Y 0
――――――――――――――――――C
switch_manager ovsmgmt/6632 Y 0
openflow/6633 Y 0
――――――――――――――――――C
system cluster/7777 Y 1

Question No : 7
An administrator needs to perform a configuration backup of NSX. From which two locations can this task be performed? (Choose two.)

正解:

Question No : 8
Where does an administrator configure logging for the NSX Manager?

正解:
Explanation:
Syslog server is specified in the NSX Manager GUI

Question No : 9
Which NSX component can validate that security policies at your organization are being enforced correctly?

正解:
Explanation:
http://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-9F7B45C1-FDFD-4E3B-96AD-30EFCB539680.html
“Activity Monitoring provides visibility into your virtual network to ensure that security policies at your organization are being enforced correctly.”

Question No : 10
What is the function of NSX Data Security?

正解:
Explanation:
Sensitive data are defined by the security policy. Running a data security scan identifies data in the virtual environment that violates the policy.
If violation report shows 0 files, it doesn’t mean there is no sensitive data (which would be implication from option D), instead it means there is no breach of security policy.
C option seems to me better definition

Question No : 11
What is required before running an Activity Monitoring report?

正解:
Explanation:
You must enable data collection for one or more virtual machines on a vCenter Server before running an Activity Monitoring report. Before running a report, ensure that the enabled virtual machines are active and are generating network traffic.
https://pubs.vmware.com/NSX-6/index.jsp?topic=%2Fcom.vmware.nsx.admin.doc%2FGUID-B796261C-27C7-4757-9E2B-4B05B641468A.html

Question No : 12
Which tool is used to detect rogue services?

正解:

Question No : 13
An administrator enables the NSX Ticket Logger to track infrastructure changes. The administrator logs out for lunch, returns and logs back in to complete the task.
What is the status of ticket logger when the administrator logs back in?

正解:
Explanation:
https://docs.vmware.com/en/VMware-NSX-for-vSphere/6.3/com.vmware.nsx.admin.doc/GUID-51297361-B8E1-4266-97AB-AE3EA0D37D3E.html

Question No : 14
Which component automates the consumption of third-party services and provides mapping to virtual machines using a logical policy?

正解:
Explanation:
C. indeed: Service Composer helps you provision and assign network and security services to applications in a virtual infrastructure. You map these services to a security group, and the services are applied to the virtual machines in the security group.

Question No : 15
Which port is used for NSX REST API Requests?

正解:
Explanation:
As written in the API Guide: https://pubs.vmware.com/NSX-6/topic/com.vmware.ICbase/PDF/nsx_604_api.pdf
Page 26: “The NSX Manager requires port 443/TCP for REST API requests.”
C> Agree with B, Port 443.

 / 6